Solved

Security

Posted on 2014-07-30
6
117 Views
Last Modified: 2014-08-21
I like to be able to secure files while users are working on them on the network.
What would be the best course of action?
Also what would occur when a user that has sync folder on there laptop leaves the network and wants to work on the files at home, will they be able to?
0
Comment
Question by:noad
6 Comments
 
LVL 56

Expert Comment

by:Cliff Galiher
ID: 40230689
Bitlocker and EFS can secure data at rest on servers. IPSec can secure data over the wire. If you want to have end to end security though, you'd want policies in place that even data on local machines is encrypted. Usually a device management solution like InTune that also turns on device encryption for corporate data. iOS and Android support this as does win8. And if broad device and data access is needed, such as hotel business centers, VDI is often used so files actually leaves the corporate network. Multiple options.
0
 
LVL 24

Expert Comment

by:Mohammed Khawaja
ID: 40230709
Another solution would be to run Terminal Services or Citrix and have all your applications run off the server.  Users would have to connect to get to documents which will be residing on a server in your computer room/data centre.
0
 
LVL 78

Expert Comment

by:David Johnson, CD, MVP
ID: 40230778
I don't understand your question..  To give an appropriate answer you will have to explain the perceived problem that you are trying to eliminate.  What are you trying to accomplish here?
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 1

Author Comment

by:noad
ID: 40231202
David,

I would like to secure that files going across the network, ie if  you open files XZY I like for the access to that file to  be secure. I'm just looking for the simplest solution without reinventing the wheel.
0
 
LVL 56

Expert Comment

by:Cliff Galiher
ID: 40231211
f access security is what you are after then that is simply using security groups and NTFS permissions. Both are basic features in Windows and are the core access controls you need to set up.
0
 
LVL 78

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 40233284
If I understand your comment correctly you want to ensure that a packet sniffer inside your network can't get the information from the file being transferred?

Use https for files outside of your local network i.e. via IIS
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
encryption of data at rest on server 6 31
IIS 7.5 to 8.0 6 75
Changing password complexity on domain 1 14
Can’t delete a file 14 87
Resolve DNS query failed errors for Exchange
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
In this Micro Tutorial viewers will learn how they can get their files copied out from their unbootable system without need to use recovery services. As an example non-bootable Windows 2012R2 installation is used which has boot problems.
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now